default search action
Akira Sato
2020 – today
- 2024
- [c38]Akira Sato, Yukitoshi Sanada:
Erasure Demodulation Characteristics with Erasure Overflow threshold. APCC 2024: 483-488 - 2023
- [j15]Senri Yoshikawa, Shuji Sannomiya, Makoto Iwata, Akira Sato, Hiroaki Nishikawa:
EDA-oriented FPGA Circuit Design Method for Four-phase Bundled-data Circular Self-timed Pipeline. J. Inf. Process. 31: 495-508 (2023) - [c37]Kazunori Fujiwara, Shuji Sannomiya, Akira Sato, Kenichi Yoshida:
Latency analysis of JP and Root DNS servers from packet capture data. COMPSAC 2023: 526-531 - 2022
- [c36]Akira Sato, Kazunori Fujiwara, Kenichi Yoshida, Shuji Sannomiya:
Benefit of third-party name server operations in DNS configuration. COMPSAC 2022: 1032-1037 - 2021
- [j14]Yuki Funayama, Keita Nakamura, Kenta Tohashi, Taku Matsumoto, Akira Sato, Shigeki Kobayashi, Yutaka Watanobe:
Automatic analog meter reading for plant inspection using a deep neural network. Artif. Life Robotics 26(2): 176-186 (2021) - 2020
- [j13]Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Spread of IP Anycast and GSLB. J. Inf. Process. 28: 562-569 (2020) - [c35]Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Cardinality Analysis to Classify Malicious Domain Names. COMPSAC 2020: 826-832 - [c34]Kazuki Haraguchi, Kazuki Yane, Akira Sato, Eiji Aramaki, Isao Miyashiro, Akiyo Nadamoto:
Chat-type Manzai application: mobile daily comedy presentations based on automatically generated manzai scenarios. MoMM 2020: 143-152 - [c33]Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Automatic Generation and Classification of Malicious FQDN. PKAW 2020: 120-129 - [c32]Kenichi Yoshida, Akira Sato, Shuji Sannomiya:
Contact analysis on COVID-19 using a campus network: poster abstract. SenSys 2020: 752-753
2010 – 2019
- 2019
- [j12]Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
Cache Effect of Shared DNS Resolver. IEICE Trans. Commun. 102-B(6): 1170-1179 (2019) - [j11]Masahiko Morita, Kazuro Shimokawa, Masaomi Nishimura, Sakiko Nakamura, Yuki Tsujimura, Satoko Takemoto, Takehiro Tawara, Hideo Yokota, Shuhei Wemler, Daisuke Miyamoto, Hidetoshi Ikeno, Akira Sato, Teiichi Furuichi, Norio Kobayashi, Yoshihiro Okumura, Yoko Shiraishi-Yamaguchi, Yuko Okamura-Oho:
ViBrism DB: an interactive search and viewer platform for 2D/3D anatomical images of gene expression and co-expression networks. Nucleic Acids Res. 47(Database-Issue): D859-D866 (2019) - [c31]Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Spread of Anycast and GSLB. COMPSAC (2) 2019: 30-35 - [c30]Eiji Aramaki, Mai Miyabe, Chihiro Honda, Seiko Isozaki, Shoko Wakamiya, Akira Sato, Isao Miyashiro:
KOTOBAKARI Study: Using Natural Language Processing of Patient Short Narratives to Detect Cancer Related Cognitive Impairment. MedInfo 2019: 1111-1115 - [c29]Eiji Aramaki, Chihiro Honda, Shoko Wakamiya, Akira Sato, Isao Myashiro:
Quick Cognitive Impairment Test for Cancer Patients Using Emotional Stroop Effect. MedInfo 2019: 1629-1630 - 2018
- [j10]Shuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa:
Abnormal Traffic Detection Circuit with Real-time Cardinality Counter. J. Inf. Process. 26: 590-600 (2018) - 2017
- [c28]Shuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa:
Cardinality Counting Circuit for Real-Time Abnormal Traffic Detection. COMPSAC (1) 2017: 505-510 - [c27]Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
Cache Effect of Shared DNS Resolver. COMPSAC (1) 2017: 511-516 - [c26]Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato:
ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption. PST 2017: 317-326 - 2016
- [c25]Shinichi Mori, Akira Sato, Kenichi Yoshida:
Enhancing performance of cardinality analysis by packet filtering. ICOIN 2016: 23-28 - [c24]Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato:
Magic mantle using social VPNs against centralized social networking services. PST 2016: 341-348 - 2015
- [c23]Hiroko Terasawa, Yota Morimoto, Masaki Matsubara, Akira Sato, Makoto Ohara, Masatoshi Kawarasaki:
Guiding auditory attention toward the subtle components in electrocardiography sonification. ICAD 2015: 231-235 - [c22]Nobuaki Fujita, Akira Sato, Masatoshi Kawarasaki:
Performance study of wavelet-based ECG analysis for ST-segment detection. TSP 2015: 430-434 - 2014
- [j9]Akira Sato:
Editor's Message to Special Issue on Internet and Operation Technology Considering Overlay Network Technology. J. Inf. Process. 22(2): 160 (2014) - [c21]Yasushi Shinjo, Xiao Kunyao, Naoki Kainuma, Daiyuu Nobori, Akira Sato:
Friend News System: A Modern Implementation of Usenet over Social VPNs. BDCloud 2014: 432-440 - [c20]Akira Sato, Hiroaki Nakanishi:
Observation and measurement in disaster areas using industrial use unmanned helicopters. SSRR 2014: 1-5 - 2013
- [j8]Hyuma Watanabe, Masatoshi Kawarasaki, Akira Sato, Kentaro Yoshida:
Wearable ECG Monitoring and Alerting System Associated with Smartphone: iHeart. Int. J. E Health Medical Commun. 4(4): 1-15 (2013) - [j7]Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
DNS Traffic Analysis - CDN and the World IPv6 Launch. Inf. Media Technol. 8(3): 833-842 (2013) - [j6]Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
DNS Traffic Analysis - CDN and the World IPv6 Launch. J. Inf. Process. 21(3): 517-526 (2013) - [c19]Akira Sato, Lukas Pichl, Taisei Kaizoji:
Using Neural Networks for Forecasting of Commodity Time Series Trends. DNIS 2013: 95-102 - 2012
- [c18]Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Koichi Sakurai, Kozo Itano:
A simple collaborative method in Web proxy access control for supporting complex authentication mechanisms. CollaborateCom 2012: 190-199 - [c17]Hyuma Watanabe, Masatoshi Kawarasaki, Akira Sato, Kentaro Yoshida:
Development of wearable heart disease monitoring and alerting system associated with smartphone. Healthcom 2012: 292-297 - [c16]Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Akiyoshi Sugiki, Kozo Itano:
A P2P Approach to Scalable Network-Booting. ICNC 2012: 201-207 - [c15]Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:
DNS Traffic Analysis: Issues of IPv6 and CDN. SAINT 2012: 129-137 - 2011
- [c14]Yasushi Shinjo, Fei Guo, Naoya Kaneko, Takejiro Matsuyama, Tatsuya Taniuchi, Akira Sato:
A distributed web browser as a platform for running collaborative applications. CollaborateCom 2011: 278-286 - 2010
- [c13]Yasushi Shinjo, D. Kamikawa, Akira Sato:
Collaboration by passing access rights for personal protected Web resources. CollaborateCom 2010: 1-10 - [c12]Yusuke Shomura, Kenichi Yoshida, Akira Sato, Satoshi Matsumoto, Kozo Itano:
A Traffic Analysis Using Cardinalities and Header Information. ICNC 2010: 55-62 - [c11]Mitsuhiro Mabuchi, Yasushi Shinjo, Koji Hasebe, Akira Sato, Kazuhiko Kato:
CapaCon: access control mechanism for inter-device communications through TCP connections. SAC 2010: 706-712 - [c10]Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida:
A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. SAINT 2010: 241-244
2000 – 2009
- 2009
- [c9]Yasushi Shinjo, Keigo Matsui, Takuya Sugimoto, Akira Sato:
An anti-spam scheme using capability-based access control. LCN 2009: 907-914 - 2008
- [j5]Akira Sato, Yukiko Sekine, Chihiro Saruta, Hirozumi Nishibe, Noriyuki Morita, Yumi Sato, Tetsushi Sadakata, Yo Shinoda, Toshio Kojima, Teiichi Furuichi:
Cerebellar development transcriptome database (CDT-DB): Profiling of spatio-temporal gene expression during the postnatal development of mouse cerebellum. Neural Networks 21(8): 1056-1069 (2008) - [c8]Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato:
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. ICN 2008: 213-222 - 2007
- [c7]Mitsuo Usami, Hisao Tanabe, Akira Sato, Isao Sakama, Yukio Maki, Toshiaki Iwamatsu, Takashi Ipposhi, Yasuo Inoue:
A 0.05�?0.05mm2 RFID Chip with Easily Scaled-Down ID-Memory. ISSCC 2007: 482-483 - 2006
- [c6]Mitsuo Usami, Akira Sato, Hisao Tanabe, Toshiaki Iwamatsu, Shigeto Maegawa, Yuzuru Ohji:
An SOI-Based 7.5µm-Thick 0.15x0.15mm2 RFID Chip. ISSCC 2006: 1191-1200 - 2005
- [j4]Kouji Tsunoda, Akira Sato, Hiroko Tashiro, Toshiro Nakanishi, Hitoshi Tanaka:
Improvement in Retention/Program Time Ratio of Direct Tunneling Memory (DTM) for Low Power SoC Applications. IEICE Trans. Electron. 88-C(4): 608-613 (2005) - 2004
- [c5]Akira Sato, Noriyuki Morita, Tetsushi Sadakata, Fumio Yoshikawa, Yoko Shiraishi-Yamaguchi, JinHong Huang, Satoshi Shoji, Mineko Tomomura, Yumi Sato, Emiko Suga, Yukiko Sekine, Aiko Kitamura, Yasuyuki Shibata, Teiichi Furuichi:
Deciphering the Genetic Blueprint of Cerebellar Development by the Gene Expression Profiling Informatics. ICONIP 2004: 880-884 - 2003
- [j3]Hiroaki Nakanishi, Hiroyuki Hashimoto, Naomi Hosokawa, Koichi Inoue, Akira Sato:
Autonomous Flight Control System for Intelligent Aero-robot for Disaster Prevention. J. Robotics Mechatronics 15(5): 491-500 (2003) - 2000
- [c4]Tamami Sugasaka, Kyoko Tanaka, Ryusuke Masuoka, Akira Sato, Hironobu Kitajima, Fumihiro Maruyama:
An agent-based system for electronic commerce using recipes. ICPADS Workshops 2000: 399-405 - [c3]Akira Sato, Junichi Ogawa, Hajime Kitakami:
An impression-based retrieval system of music collection. KES 2000: 856-859
1990 – 1999
- 1999
- [j2]Tamami Sugasaka, Ryusuke Masuoka, Akira Sato, Hironobu Kitajima, Fumihiro Maruyama:
SAGE and its application to electronic commerce - SAGE: Francis: A system based on "virtual catalog". Syst. Comput. Jpn. 30(6): 36-46 (1999) - 1998
- [c2]Ryusuke Masuoka, Tamami Sugasaka, Akira Sato, Hironobu Kitajima, Fumihiro Maruyama:
SAGE and Its Application to Inter-company EC. PAAM 1998: 123-136 - 1997
- [c1]Hajime Kitakami, Yasuma Mori, Masatoshi Arikawa, Akira Sato:
An Integration Methodology for Autonomous Taxonomy Databases Using Priorities. DASFAA 1997: 243-252 - 1995
- [j1]Masafumi Hagiwara, Akira Sato:
Analysis of Momentum Term in Back-Propagation. IEICE Trans. Inf. Syst. 78-D(8): 1080-1086 (1995)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint